Kaspersky Lab, one of the world’s fastest-growing cybersecurity companies and the largest that is privately-owned, presents a short story about the company - its Values, Business, Solutions, i.e. what we think and strive for in our business, how we develop our technologies and solutions to protect our customers and people around the globe against cyberthreats, as well as the results we've managed to achieve.
2. We believe that everyone –
from home computer users through
to large corporations and governments –
should be able to protect what matters
to them most. Whether it’s privacy, family,
finances, customers, business success
or critical infrastructure, we've made
it our mission to secure it all.
Eugene Kaspersky,
chairman and CEO, Kaspersky Lab
4. FACTS ABOUT US
>3,000 highly
qualified specialists
>20 million product
activations per year
Founded in 1997 and led
by Eugene Kaspersky
Holding company registered
in the United Kingdom
Provides innovative
IT security solutions for
business and consumers
One of the four biggest endpoint
security vendors*
Our solutions are recognized and
awarded in independent tests and reviews
"Leader" according to the Gartner
Magic Quadrant for Endpoint
Protection Platforms**
711 million USD — global
unaudited revenue in 2014
* The company was rated fourth in the IDC rating Worldwide Endpoint Security Revenue by Vendor, 2013. The rating was published in the IDC report "Worldwide Endpoint Security 2014–2018 Forecast
and 2013 Vendor Shares (IDC # 250210, August 2014). The report ranked software vendors according to earnings from sales of endpoint security solutions in 2013.
** Gartner, Magic Quadrant for Endpoint Protection Platforms, Peter Firstbrook, John Girard, Neil MacDonald, December 22, 2014. The report is available at Kaspersky Lab upon request.
Gartner does not endorse any vendor, product or service depicted in its research publications, and does not advise technology users to select only those vendors with the highest ratings or other designation. Gartner research publications consist of the opinions of Gartner's
research organization and should not be construed as statements of fact. Gartner disclaims all warranties, expressed or implied, with respect to this research, including any warranties of merchantability or fitness for a particular purpose.
Essentials Numbers Achievements
users worldwide
are protected by us> 400,000,000
5. representative
regional
offices
countries
and territories
in which we operate
GEOGRAPHY
200 36
South
America
Brazil
Europe
Austria
Czech Republic
France
Germany
Israel
Italy
Netherlands
Poland
Portugal
Romania
Spain
Denmark
Switzerland
UK
Russia (HQ)
Ukraine
Asia
Turkey
UAE
China
Hong Kong
India
Japan
Malaysia
South Korea
Singapore
Kazakhstan
Africa
South Africa
Australia
North
America
Canada
Mexico
USA
7. OUR TRANSPARENCY PRINCIPLES
Our solutions
and technologies
do not process
personal data
We detect
and neutralize
threats, regardless
of their origin
or purpose
We work with
governments
and law enforcement
agencies to fight
cyberthreats
We cooperate
with the IT securiitty
industry in joint
cyberthreat
investigations
We are committed
to the trustworthy
development
of our technologies
and solutions
8. OUR ROLE IN THE GLOBAL IT SECURITY COMMUNITY
We participate in joint operations and cyberthreat
investigations with the global IT security community,
international organizations such as INTERPOL and
Europol, law enforcement agencies and CERTs worldwide
We hold regular training courses
for INTERPOL and Europol
officers and the police forces
of many countries, e.g. City
of London Police
We host the annual Kaspersky
Lab Security Analyst Summit
which brings together the world’s
best IT security experts
We provide expert speakers
at conferences around
the globe, e.g. World Economic
Forum in Davos
10. new malicious files
detected by Kaspersky
Lab every day325,0001/3 40
Our Global Research and Analysis Team of security experts
constantly explores and fights the most advanced cyberthreats
EXPERTISE
of our employees
are R&D
specialists
world-leading
security experts:
our elite group
11. TRENDS AND THREATS
We understand global IT trends and the threats they bring
Consumerization & mobility
Increasing
online commerce
Critical infrastructure at risk
Big data
Internet of ThingsCloud & virtualization
Privacy & data
protection challenge
Fragmentation of the Internet
Mobile threats Online
banking at risk
Massive data leaks
Decreasing cost of APTs
Commercialization of APT
Hacktivism
Supply chain attacks
Cyber-mercenaries
hotel networks
“Wipers” & cyber-sabotage
Targeted attacks
Financial phishing attacks
Ransomware
programs
Malware for ATMs
Attacks on PoS terminals
Merger of cybercrime and APT
Targeting
Internet of Things
Threats
to Smart Cities
12. OUR RESEARCH
We discover and dissect the world’s
most sophisticated threats
DuquStuxnet
miniFlame
Flame
Gauss
Icefog
Winnti
NetTraveler
Miniduke
Epic Turla
Energetic Bear /
Crouching Yeti
RedOctober
CosmicDuke
Darkhotel
Careto /
The Mask
Regin
2010 2011 2012 2013 2014
CozyDuke
Carbanak
Desert
Falcons
Equation
Naikon
Hellsing
2015
TeamSpy
Duqu 2.0
Animal Farm
Kimsuky
13. OUR MAJOR DISCOVERIES
Cyber-espionage
malware
Cyber-espionage
campaigns
Series of cyber-
espionage
campaigns
Classification
Detection
Active Since
FLAME GAUSS RED OCTOBER CARETO /THE MASK
>600
specific targets
The vast majority
of victims were
located
in Lebanon
101–500
diplomatic and
governmental
agencies
>10,000 victims
in 31 countries
Up to 100 victims
among telecoms,
government entities,
multi-national
political bodies
and others
2007 2012 2004 2014 2003 2002 2014
Spreads over a
local network or
via a USB-stick
Records screen-
shots, audio,
keyboard activity
and network
traffic
Sophisticated
toolkit with
modules that
perform a variety
of functions
One of the first
massive global
espionage cam-
paigns
Contains Russian
language text in
the code notes
Complex toolset
with malware,
rootkit, bootkit, one
of the most
advanced APTs ever
Attacks
devices running
on Windows,
Mac OS X & Linux
The first
cyberattack
platform known
to penetrate
and monitor
GSM networks
in addition
to other “standard”
spying tasks
Up to 1,000
high-profile victims
in nanotechnology,
nuclear industry
and other industries,
as well as activists,
mass media & others
Equation malware
is able to infect the
hard drive
firmware, it uses
“interdiction”
technique to infect
victims and mimics
criminal malware
Malware infections
linked to the P5+1
events and venues
for high level
meetings between
world leaders
A highly
sophisticated
malware platform
exploiting up
to three zero-day
vulnerabilities
Description
Targets
May 2012 July 2012 January 2013 February 2014 Spring of 2012 2014 2015
REGIN EQUATION DUQU 2.0
Complex
cyberattack platform
16. ENTERPRISE SECURITY VISION.
POWERED BY INTELLIGENCE
Detect
Prevent
Prevent the penetration
of malware inside the perimeter,
identify and remediate
Predict
Empower customers to predict
forthcoming incidents
by analyzing the evolution
Respond
Enterprise
Platform
of threats and breach tactics
React properly post-breach
with a minimal impact
on resources and mitigate
the aftermath effects
it at an early stage
Detect the breach incident
when penetration attempt
is successful, e.g. discovery
of APT
17. ENTERPRISE SECURITY PORTFOLIO
Providing protection across a variety of enterprise IT systems, from
endpoints to data centers, online services and critical infrastructure
Endpoint
Security
Mobile
Security
Security
Solutions
for Data Centers
Industrial
Cyber Security
Anti Targeted
Attacks Platform
Fraud
Prevention
DDoS
Protection
Virtualization
Security
Security
Intelligence
Services
18. SMALL & MEDIUM BUSINESS SECURITY
Kaspersky
Endpoint Security
for Business
Targeted products including:
Easy to deploy
and use
Kaspersky
Security
for Virtualization
Kaspersky
Security
for Mobile
Kaspersky
DDoS
Protection
Multi-layered protection against known, unknown and advanced threats,
fueled by global threat research and intelligence
The complete
security platform
Managed from one
central console
19. Simple, reliable, practical solutions, designed
specifically with the needs of VSBs in mind
VERY SMALL BUSINESS SECURITY
Scan
Safe
Money
Update
Password
Manager
Data
Encryption
Backup
& Restore
Fast and easy
installation
No special
IT administration
skills needed
Protection against
all types of Internet
threats
Kaspersky
Small Office
Security
20. HOME SECURITY
Windows PC Mac OS X Android iOS
We deliver to home users a range of solutions for different platforms to protect
their privacy, identity, data and money without affecting device performance
For multiple devices
Kaspersky
Total Security —
Multi-Device
For single devices
Platforms covered
Free solutions
Kaspersky
Internet Security
for Android
Kaspersky
Internet
Security
for Mac
Kaspersky
Threat
Scan
Kaspersky
Security
Scan
Kaspersky
Virus Removal
Tool ...and more
Kaspersky
Internet
Security –
Multi-Device
Kaspersky
Password
Manager
Kaspersky
Safe Kids
Kaspersky
Anti-Virus
21. INTERNATIONAL AWARDS & RECOGNITIONS
20 40 60 80
* Notes: According to summary results of independent tests in 2014 for corporate, consumer and mobile products.
Summary includes tests conducted by the following independent test labs and magazines:Test labs: AV-Comparatives, AV-Test, Dennis Technology Labs, MRG Effitas, NSS Labs, PC Security Labs, Virus Bulletin
The size of the bubble reflects the number of 1st places achieved.
0
20
10
30
40
50
100
No. of independent
tests/reviews
Score
of TOP 3 places,
%
Bitdefender
Sophos
G DATA
Symantec
F-Secure Intel Security (McAfee)
Trend
Micro
Avira
Avast
BullGuard
AVG
ESET
AhnLab
MicrosoftPanda
Security
ThreatTrack (VIPRE)
Qihoo
360
Kingsoft
Tencent
Kaspersky
Lab
22. first places51
66 top-three finishes
INTERNATIONAL AWARDS & RECOGNITIONS
independent tests completed by Kaspersky Lab
products in 2014 alongside 19 competitors93
24. MARKET RECOGNITION
We are officially named a “Leader”
in the Gartner Magic Quadrant
for Endpoint Protection Platforms
COMPLETENESS OF VISION As of December 2014
Gartner, Magic Quadrant for Endpoint Protection Platforms, Peter Firstbrook, John Girard, Neil MacDonald, December 22, 2014
Gartner does not endorse any vendor, product or service depicted in its research publications, and does not advise technology users to select only those vendors with the highest ratings. Gartner research publications consist of the opinions of Gartner's research organization and
should not be construed as statements of fact. Gartner disclaims all warranties, expressed or implied, with respect to this research, including any warranties of merchantability or fitness for a particular purpose.
CHALLENGERS LEADERS
Microsoft
Eset
Sophos
Symantec
TrendMicro
Kaspersky
Lab
Intel Security
(McAfee)
Bitdefender
Qihoo360
ThreatTrack
Security
Panda Security
Webroot
Landesk
Stormshield
Lumension Security
IBM
CheckPoint
Softwaretechnologies
NICHE PLAYERS VISIONARIES
ABILITYTOEXECUTE
F-Secure
25. We are ranked as one of the "Leaders"
in the Endpoint Security Solutions market
by Forrester Research, Inc.
The Forrester Wave™: Endpoint Security, Q1 2013.
The Forrester Wave™ is copyrighted by Forrester Research. Inc. Forrester and Forrester Wave™ are trademarks of Forrester Research, Inc. The Forrester Wave™ is a graphical representation of Forrester's call on a market and is plotted using a detailed spreadsheet with exposed
scores, weightings, and comments. Forrester does not endorse any vendor, product, or service depicted in the Forrester Wave. Information is based on best available resources. Opinions reflect judgment at the time and are subject to change.
Symantec
TrendMicro
F-Secure
Weak
Weak
Strategy Strong
Strong
Current
offering
Market presence
Full vendor participation
LANDesk
IBM
Lumension
RISKY BETS
CONTENDERS LEADERS
STRONG
PERFORMERS
Sophos
Kaspersky
Lab
McAfee
MARKET RECOGNITION
26. We were named a "Leader"
in the IDC MarketScape
IDC MarketScape: Western European Enterprise Endpoint Security 2012 Vendor Analysis (doc #IS01V, March 2013)
IDC's Go-to-Market Services (GMS) oers webrights and reprints of IDC research to support your marketing initiatives. GMS can also help you to leverage IDC's globally respected brand by delivering custom content and multimedia
deliverables which are drawn from research and analysis independently conducted and published by IDC analysts. Learn more here or contact us at gms@idc.com.
MARKET RECOGNITION
CONTENDERS
PARTICIPANTS
MAJOR
PLAYERS
LEADERS
Kaspersky
Lab
Symantec
McAfee
Trend
Micro
F-Secure
Microsoft
Check Point
Software
Eset
BitDefender
Panda Security
Sophos
27. SCHO OL
OUR CUSTOMERS
We work in a wide range of industry sectors. Our solutions and services successfully
protect 270,000 clients around the world, regardless of size or complexity
Public organizations Private companies
Transport
Construction
TechnologyOil & Gas
Telecom
TourismInformation
Banking
&
Finance
Educational
Governmental
Healthcare
28. SCHO OL
OUR CUSTOMERS
We work in a wide range of industry sectors. Our solutions and services successfully
protect 270,000 clients around the world, regardless of size or complexity
Public organizations Private companies
Transport
Construction
TechnologyOil & Gas
Telecom
TourismInformation
Banking
&
Finance
Educational
Governmental
Healthcare
~2,000
customers in
123
countries
~40,000
customers in
105
countries
81
countries
customers in
~7,500
29. TECHNOLOGY AND OEM PARTNERS
industry leaders
trust us to protect
their customers
~120
Technology Integration
Private Labelling / Co-branding
Pre-installation / Bundling
Preload
openwave
messaging
30. What brings us together: Technologies. Innovation. Passion.
SPONSORSHIP
31. EDUCATIONAL AND SOCIAL PROJECTS
Kaspersky
Academy
A series of projects
to support talented young IT
security specialists
Security
Startup Challenge
A mentor-driven acceleration
program in partnership with
venture industry leaders
Anti-
cyberbullying
We partner with independent
organizations (such as European
Schoolnet EUN) and law
enforcement agencies to raise
awareness about cyberbullyingProvides startups with access
to cutting-edge business,
cybersecurity and cross-industry
expertise from around the world